Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Possibly yet another MS mail worm

  • From: Alexei Roudnev
  • Date: Tue Mar 02 00:51:57 2004

Moreover, they can encrypt zip by password and write password inside the
message. As a result, no one virus scan detect
this virus.

And they will find enough idiots, who opens zip, enter password and run
virus.

----- Original Message ----- 
From: "Todd Vierling" <tv@duh.org>
To: "Curtis Maurand" <curtis@maurand.com>
Cc: <nanog@merit.edu>
Sent: Monday, March 01, 2004 6:32 AM
Subject: Re: Possibly yet another MS mail worm


>
> On Mon, 1 Mar 2004, Curtis Maurand wrote:
>
> : > It's annoying how easily these things spread even though they don't
rely on
> : > a specific OS vulnerabililty -- hell, it's an executable *in a
zipfile*, so
> : > it requires opening the zipfile and then running the program inside
it.  Of
> : > course everyone will run it, even though it's named dygfwefuih.exe
(random
> : > characters before .exe).  <grumble>
> :
> : Sure they do....its called COM/DCOM/OLE/ActiveX or whatever they
> : want to call it this week.  Its on every windows system.
>
> No, my point was that the majority of newer trojan mail viruses don't
depend
> on ActiveX exploits -- they simply wait, dormant, for a n00b to click on
> this mysterious-looking Zip Folder, and the mysterious-looking EXE inside.
>
> It's as if the modern e-mail viruses are closer to human infections.  Only
> the clueful are immune.  8-)
>
> -- 
> -- Todd Vierling <tv@duh.org> <tv@pobox.com>





Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.